Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 16:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bf17900c0dc35b51818e25e46eb17208.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
General
-
Target
bf17900c0dc35b51818e25e46eb17208.exe
-
Size
448KB
-
MD5
bf17900c0dc35b51818e25e46eb17208
-
SHA1
21562902363beae4a0ed1c2a9ef4c90aa4c3e3af
-
SHA256
b42cc7a4303bb42b02067de424bd857540da854f0e71d5c8c987d72c05e16e3d
-
SHA512
b83ce91f1b9960dba74af310bd6a0e633cede85df6751bd352dcb10b47434e2bb0c0388e487e231952c0672e56d12d0b4a8b09b95c0d470f93738603756b4036
-
SSDEEP
12288:QboBb/W9ANGBAFb5i0P6HfewKQLYg0yCxf:4xBAiAHwfzc
Malware Config
Signatures
-
Dave packer 2 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral2/memory/940-3-0x0000000002360000-0x0000000002392000-memory.dmp dave behavioral2/memory/940-6-0x0000000000610000-0x0000000000640000-memory.dmp dave -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
bf17900c0dc35b51818e25e46eb17208.exepid process 940 bf17900c0dc35b51818e25e46eb17208.exe 940 bf17900c0dc35b51818e25e46eb17208.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/940-3-0x0000000002360000-0x0000000002392000-memory.dmpFilesize
200KB
-
memory/940-6-0x0000000000610000-0x0000000000640000-memory.dmpFilesize
192KB
-
memory/940-8-0x00000000023A0000-0x00000000023CF000-memory.dmpFilesize
188KB
-
memory/940-9-0x0000000000640000-0x000000000066E000-memory.dmpFilesize
184KB
-
memory/940-11-0x00000000023A0000-0x00000000023CF000-memory.dmpFilesize
188KB